IBM touts encryption innovation
New technology performs calculations on encrypted data without decrypting it
Network World - IBM today said one of its researchers has made it possible for computer systems to perform calculations on encrypted data without decrypting it.
IBM says the breakthrough would let computer services, such as Google Inc. or others storing the confidential, electronic data of others, fully analyze data on their clients' behalf without expensive interaction with the client and without seeing any of the private data.
The idea is a user could search for information using encrypted search words, and get encrypted results that they could then decrypt on their own. Other potential applications include enabling filters to identify spam, even in encrypted e-mail, or protecting information contained in electronic medical records. The breakthrough might also one day enable computer users to retrieve information from a search engine with more confidentiality, IBM said.
IBM Researcher Craig Gentry calls the technology "fully homomorphic encryption," which uses a mathematical system known as an "ideal lattice," that lets people fully interact with encrypted data in ways previously thought impossible.
Using the technology could also bolster the cloud computing model where a service provider hosts the confidential data of others. It might better enable a service to perform computations on clients' data at their request, such as analyzing sales patterns, without exposing the original data.
"Fully homomorphic encryption is a bit like enabling a layperson to perform flawless neurosurgery while blindfolded, and without later remembering the episode. We believe this breakthrough will enable businesses to make more informed decisions, based on more studied analysis, without compromising privacy. We also think that the lattice approach holds potential for helping to solve additional cryptography challenges in the future, " said Charles Lickel, vice president of Software Research at IBM in a release.
According to an article on Forbes.com, Gentry's solution has a catch: It requires immense computational effort. In the case of a Google search, for instance, performing the process with encrypted keywords would multiply the necessary computing time by around 1 trillion, Gentry estimates.
IBM said two fathers of modern encryption -- Ron Rivest and Leonard Adleman -- together with futurist Michael Dertouzos, introduced and struggled with the notion of fully homomorphic encryption about 30 years ago. Although advances through the years offered partial solutions to this problem, a full solution that achieves all the desired properties of homomorphic encryption did not exist until now.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- PCI DSS Compliance in Cloud Environments This technology analysis addresses the challenges of the evolving cloud security landscape and how organizations can achieve PCI DSS compliance in cloud environments...
- Gartner 2013 Magic Quadrant for Enterprise Backup/Recovery Software See why CommVault was positioned as the #1 leader in Gartner's 2013 Magic Quadrant for Enterprise Backup/Recovery software for the 3rd year in...
- Forrester Report: CommVault is a Leader in Enterprise Backup and Recovery In this report, Forrester takes a deep dive into the evaluation criteria, how CommVault is positioned and the features and functionality that make...
- Forrester Wave for Enterprise Backup and Recovery Read this report to see how CommVault continues to outpace its competitors and why Forrester positioned CommVault Simpana as the top backup and...
- Four Myths of High-Productivity App Dev Debunked Debunk the main myths surrounding high-productivity application development and how both platforms have overcome them.
On-Demand Webcast: 7 Reasons to Choose VoIP
Thinking about a new phone system for your business?
Be sure to watch this informative webcast. Steve Strauss, small business columnist for USA...
All Regulatory Compliance White Papers |